Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Software Development Tools No-Code Development
Business
Entrepreneurship Communication Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certifications Network & Security Hardware Operating Systems & Servers Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Paid Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement & Gardening Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition & Diet Yoga Mental Health Martial Arts & Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Learning Teacher Training Test Prep Other Teaching & Academics
Web Development JavaScript React Angular CSS Node.Js Typescript HTML5 PHP
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Amazon AWS Cisco CCNA CompTIA Security+ Microsoft AZ-900
Microsoft Power BI SQL Tableau Data Modeling Business Analysis Data Analysis Data Warehouse Business Intelligence Blockchain
Unity Unreal Engine Game Development Fundamentals C# 3D Game Development C++ Unreal Engine Blueprints 2D Game Development Mobile Game Development
Google Flutter iOS Development Android Development Swift React Native Dart (programming language) Kotlin SwiftUI Mobile App Development
Graphic Design Photoshop Adobe Illustrator Drawing Canva Digital Painting InDesign Design Theory Procreate Digital Illustration App
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Life Purpose Mindfulness Sound Therapy Emotional Intelligence Coaching
Business Fundamentals Entrepreneurship Fundamentals Freelancing Business Strategy Online Business Startup Business Plan Blogging Amazon Kindle Direct Publishing (KDP)
Digital Marketing Social Media Marketing Marketing Strategy Internet Marketing Copywriting Email Marketing Google Analytics Startup Advertising Strategy

IT & SoftwareNetwork & SecurityInformation Security

Evidence-Based Information Security Management

Achieve a positive Return of Investment from Information Security implementing information security processes!
Rating: 4.2 out of 54.2 (12 ratings)
184 students
Created by Vicente Aceituno Canal
Last updated 5/2019
English
English [Auto]

What you'll learn

  • Use information security metrics for the effective management of cybersecurity
  • Represent cybersecurity metrics in compact and engaging dashboards or reports
  • How to use reports in a way that leads to understanding the security posture of the organisation and drive the right decisions
  • Apply continuous improvement to cybersecurity

Requirements

  • The student should be working or preparing to work as an information security manager

Description

In this course you will master the design and operation of information security processes with metrics and you will be able to represent this metrics in compact and engaging dashboards or reports. You will learn what is a measurement, how your choice of a model influences what gets measured, what is the relationship between security activity and business goals, and how to use reports in a way that leads to understanding the security posture of the organisation and drive the right decisions. This course is for experienced information security managers to want to move their ISMS beyond simple Compliance.

If you want to avoid the following ISMS common failings, then this course is for you:

  1. When specific people go on leave or get sick, performance is affected.

  2. Audits are painful and it takes a significant effort to pass successfully.

  3. Changes in the ways things are done are difficult and slow to implement.

  4. The same errors are made over and over again.

  5. More than 20% of the time of the team is used trying to determine what to do or how to do it.

  6. It is no infrequent to enter discussions with other teams about who is responsible for what.

  7. The available Metrics do not reflect the performance of the team or the level of security.

  8. Magic bullets are tried by management on a monthly basis and forgotten shortly after.

  9. New ticketing software was supposed to solve all management issues. Instead, it has introduced issues of its own.

  10. Your ISMS is certified, but you are conscious that this wouldn't prevent a serious incident from happening.

Who this course is for:

  • Experienced information security professionals

Instructor

Vicente Aceituno Canal
Evidence-based cybersecurity management leader
Vicente Aceituno Canal
  • 4.2 Instructor Rating
  • 12 Reviews
  • 184 Students
  • 1 Course

Evidence-based Cybersecurity management leader.

My subjects of interest are the application of scientific method to cybersecurity management, maturity and capability as indications of the ability of organizations to improve cybersecurity, and Identity Management.

Over 20 years experience in management of information security, I am the lead author of the Information Security Management Standard O-ISM3, published by The Open Group in 2011 (updated version to be published in 2017). I have been long involved in the development of my profession: former President of the Spanish chapter of the Information Security Systems Association; former President of the First Information Security Testing Conferences. Member of the Security Forum Steering Committee of The Open Group; ISMS Forum Member, ISACA member. My articles have been published in ISACA's Control, the ISSA Journal, SC Magazine Online, Pentest Magazine, ENISA Quarterly, Revista SIC and Red/Seguridad, among others.



Top companies choose Udemy Business to build in-demand career skills.
NasdaqVolkswagenBoxNetAppEventbrite
  • Udemy Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Investors
  • Terms
  • Privacy policy
  • Sitemap
  • Accessibility statement
Udemy
© 2022 Udemy, Inc.